Proceedings of 10th Global Business and Social Science Research Conference

advertisement

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

Can Demographic Characteristics Influence Perception on The Risk of

Asset Misappropriation?: Malaysian Empirical Evidence

Mohamad Afzhan Khan Bin Mohamad Khalil*, Anuar Bin Nawawi** and Nurmazilah

Dato’ Mahzan***

According to several surveys, asset misappropriation stands out to be the most common type of occupational fraud. The purpose of this study is to develop a reliable and valid construct for risk of asset misappropriation and to assess the association between bankers’ demographic factors and their perception on the risk of asset misappropriation.

This is a cross sectional study conducted on personnel of ten financial institutions in

Malaysia in the year 2013. The fraud triangle theory underpins the development of the survey instrument. A survey questionnaire was designed and administered to 553 bankers out of which 334 were usable responses. Cochran’s method was adopted for sample size determination. Face to face data collection procedure with the help of research assistants were undertaken to improve the response rate which turned out to be sixty percent. The data collected were cleaned and issues on reliability, validity and normality of distribution were resolved. From an initial list of twenty two possible items that represent the risk of asset misappropriation, a final list of eleven items was found to be conclusive after testing for confirmatory factor analysis (chi square = 4.47; GFI =

0.93; CFI = 0.97; NFI = 0.96; TLI = 0.95; RMSEA = 0.10), normality (skewness < 1.00) and reliability (Cronbach alpha = 0.96; composite reliability = 0.96; average variance extracted = 0.70). Subsequently, a one way ANOVA was employed to test for significant associations between the bankers’ demographic characteristics and their perception on the risk of asset mis appropriation. It was found that bankers’ age (p = 0.01), working experience (p = 0.01), marital status (p = 0.01) and academic qualification (p = 0.10) had significant bearings on their perception of the risk of asset misappropriation within the financial institutions.

1. Background of the Study

The Auditing Standard (ASA 240) defines asset misappropriation as a type of fraud that is often perpetrated by employees in relatively small and immaterial amounts (Coram et al., 2008). Asset misappropriation consists of fraudulent disbursement, skimming revenues and payroll fraud (Wells,

2007). Based on the PwC Global Economic Crime Survey (2009), asset misappropriation is the theft of assets, including monetary assets, cash, supplies and equipment by directors and employees for their own benefit. Fraud has been a world-wide problem for many years and it affects not only the victims, but also companies in a very broad spectrum. The Association of Certified Fraud Examiners

(ACFE) found that United States’ organisations lost 7% of their annual revenues to fraud, which indicated a stunning loss of US$994 billion (Ramamoorti and Dupree, 2010). KPMG (2009) reported an increase from 62% to 66% from year 2004 to 2008 regarding the opinion of respondents on the severity of fraud problems in Malaysia. In neighbouring countries such as India (86%), Thailand

(71%) and Australia (55%), fraud is also regarded as a major problem based on the same survey.

*Mohamad Afzhan Khan Bin Mohamad Khalil, Business School, Open University Malaysia, Email : afzhankhan@oum.edu.my

**Dr. Anuar Bin Nawawi, Faculty of Accountancy, University Teknologi MARA, Email : anuar217@salam.uitm.edu.my

***

Dr. Nurmazilah Dato’ Mahzan, Faculty of Business and Accountancy, University of Malaya, Email : nurmazilah@um.edu.my

1

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

The ACFE (2012) in their latest study reported that asset misappropriation is getting from bad to worse. Skimming (203 cases), cash larceny (152 cases), billing (346 cases), expense reimbursement

(201 cases), cheque tampering (165 cases), payroll (129 cases) and cash register disbursement (50 cases) were among the types of asset misappropriation reported in that global survey. Asset misappropriation has received very little attention in Malaysia except for Ahmad and Norhashim

(2008) and Liew et al. (2011). The study of Ahmad and Norhashim (2008) performed an exploratory factor analysis in validating the asset misappropriation instrument. Thereupon, at the present time, there is a need for a study to extend knowledge by performing a confirmatory factor analysis on this respective construct.

2. Research Objectives

According to several surveys, asset misappropriation stands out as the most common type of occupational fraud. The purpose of this study is to develop a reliable and valid construct for risk of asset misappropriation and to assess the association between bankers’ demographic characteristics and their perception on the risk of asset misappropriation.

3. Review of the Literature

The measurement of asset misappropriation was first developed by Hillison et al. (1999) through a thorough literature review. Later on, many studies had used the items mentioned in Hillison et al.

(1999) to measure the risk of asset misappropriation. The study of Ahmad and Norhashim (2008) and Liew et al. (2011) in the Malaysian environment had somewhat referred to the measurement provided by Hillison et al. (1999). In a recent study by Agarwal and Medury (2014), the measurement items were again listed in their literature review. Although an exploratory factor analysis on this measurement was done by Ahmad and Hashim (2008), there is very little evidence on the utilisation of a confirmatory factor analysis to validate this construct. This study will contribute extensively to the field of fraud auditing by reconstructing and validating this research instrument. The items mentioned by previous studies (Agarwal and Medury, 2014; Hillison et al., 1999) are disclosed in Table 1.

2

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

Table 1: Measurement of the Risks of Asset Misappropriation

(Agarwal and Medury, 2014; Hillison et al., 1999)

A17

A18

A19

A20

A21

A22

A7

A8

A9

A10

A11

A12

A13

NO

A1

A2

A3

A4

A5

A6

A14

A15

A16

STATEMENTS

Received checks forged

Recording goods not returned and stealing cash

Cash sales shown as credit sales and cash stolen

Discount on sales not given but shown in books and money siphoned off

Credit sales collected but not recorded

Writing off receivables as bad debts and stealing the cash received

Collusion between buyer and seller to process refunds for goods not returned

Stealing assets, stores and spares, raw material, and finished goods

Sales not done but invoiced and goods stolen

Selling waste and scrap material and pocketing receipts

Including fictitious employees on pay roll and taking out their proceeds

Embezzling payroll and other tax withholdings

Encashing unused payroll checks

Encashing unused dividend pay checks

Unauthorized overtime shown and cash withdrawn

Charging personal purchase to company by misusing purchase orders or organizational credit cards

Diverting advances to personal use

Special price or privilege to customers and suppliers against kickbacks

Paying false invoices obtained through collusion with suppliers

Altering bank deposits

Stealing cash funds

Bank account manipulations to give benefit to one at the cost of the other and taking kickbacks.

The statistical analysis of Liew et al. (2011) showed some of the common causes of white-collar crime in Malaysia using the agency and self control theories. With a sample size of 300, using the convenience sampling methodology, a one way analysis of variance (ANOVA) was performed in their study. They found that certain demographic factors (age, marital status, education level and occupation) have influenced the respondents’ views on the common causes of white collar crime.

This present study will attempt to narrow the analysis gap of Liew et al. (2011) by using the fraud triangle theory (Cressey, 1953) as the underpinning theory and asset misappropriation as the dependent variable. The fraud triangle theory that underlies this paper states that asset misappropriation is committed by individuals due to three factors viz. opportunity, pressure and rationalisation. Furthermore, improper internal control system, lack of usage of technology tools and ineffective whistleblowing processes provide ample opportunity for fraud to take place. In addition, professional skepticism and a questioning mind are needed from fraud auditors and managers to assess the risks of fraud occurrence which may arise from personal financial pressure of potential fraud perpetrators. Moreover, acceptable codes of ethics are needed and they should be communicated to every person in an organisation to ensure that these people do not use rationalisation as a reason to commit asset fraud.

3

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

4. Research Methodology

As could be seen below in Figure 1, a literature review was first done to develop the initial research questionnaire. Later, the questionnaire was pretested in a series of interviews with six experts (vice president of risk management department, government auditor, internal auditor, operational auditor, lecturer and senior lecturer in auditing). The interviews were carefully transcribed and a thematic analysis was performed to record the opinions obtained from the interviews. This led to some changes made in the research questionnaire after a focus group discussion with two academicians who were content experts. The research instrument was then pilot tested using quantitative methodology. Out of 55 questionnaires given to bankers, only 40 were usable for the pilot analysis.

Preliminary assessment was validity and reliability was performed. From the analysis, the research questionnaire was further modified. The modified research questionnaire was then subjected to another scrutiny by way of an independent external reviews by five reviewers deemed to be specialists in the field of economics, finance, statistics, fraud auditing and accounting to solicit their independent opinions. The five reviewers were a university professor, an associate professor, a certified statistician and two other senior academics with PhD qualifications. The survey questionnaire was subjected to further fine tuning. The final research questionnaire was then ready for administration. The survey questionnaires were administered to 553 bankers out of which 334 were usable responses. The computation of sample size was done according to the recommendations provided by previous studies (Bartlett et al., 2001; Krejcie and Morgan, 1970).

Face to face data collection procedure with the help of nineteen data collection assistants was undertaken to improve the response rate which turned out to be sixty percent. The data collected were cleaned and issues on reliability, validity and normality of distribution were resolved. The summary of methodology is provided below in Figure 1.

Figure 1: Development of Research Instrument

4

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

5. Results and Discussion

Structural equation modelling (SEM) has been used by a number of researchers. There are many applications embedded within the model, one of which is the confirmatory factor analysis (CFA). This study has confirmed the validity and reliability of the risk of asset misappropriation construct using the

CFA mechanism. Figure 2 below describes the structural equation model developed in this study.

Based on this model, the indices for the CFA were determined. The indices are illustrated in Table 2.

Figure 2: The Structural Equation Model for the Risk of Asset Misappropriation

Construct e1

1 e2

1 e3

1 e4

1 e5

1 e6

1 e7

1 e8

1 e9

1 e10

1 e11

1

AM11 AM10 AM9

1

AM8 AM7 AM6 AM5 AM4 AM3 AM2 AM1

ASSET

MISAPPROPRIATION

Root mean square error of approximation (RMSEA) 0.10

Table 2: Confirmatory Factor Analysis Indices for the Risk of Asset

Misappropriation Construct

Index

Chi square

Observed

Indices

4.47

Recommended

Indices

Below 5.00

Goodness of fit index (GFI) 0.93

Normed fit index (NFI)

Tucker Lewis index (TLI)

0.96

0.95

Above 0.90

Above 0.90

Above 0.80

Comparative fit index (CFI) 0.97 Above 0.90

Below 0.10

5

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

As evident from Table 2 above, the confirmatory factor analysis ( chi square = 4.47; GFI = 0.93; CFI

= 0.97; NFI = 0.96; TLI = 0.95; RMSEA = 0.10

) fall within the suggested ranges by previous researchers (Chinda and Mohamad, 2008; Hooper et al., 2008; Singh, 2009; Wheaton et al, 1977).

The closest confirmatory factor analysis results that could be compared to the risk of asset misappropriation of this study was provided by Kung and Huang (2013) who reported their findings

(RMR = 0.046, GFI = 0.953, RMSEA = 0.067). Illegal activities and dubious behaviours were measured in their respective research.

The indices obtained in this present study are almost identical to the findings of Kung and Huang

(2013). Assessment of normality for the items representing the risk of asset misappropriation in this study indicates robust results as the figures are within the suggested ranges proposed by previous researchers (Lei and Lomax, 2005; Weinberg and Abramowitz, 2002). For a normal distribution, the

Kurtosis should be between 0 and 3 (Lei and Lomax, 2005) and skewness should be between -2 to

+2 (Weinberg and Abramowitz, 2002). Based on the explanation of Hair et al. (1998), convergent validity is measured by examining the composite reliability and the average variance extracted from the measures. The measures for reliability in this study are above 0.80 as recommended by Zikmund et al. (2010) and the average variance extracted is above 0.50 as suggested by Hair et al. (1998).

The observed results of this study (composite reliability = 0.96; average variance extracted = 0.70) prove that the convergent validity requirements of the instrument are met. Moreover, the internal consistency (Cronbach alpha = 0.96) is also assured (Zikmund et al., 2010). Collectively, the aforementioned indices suggest that the construct for the risk of asset misappropriation which was proposed by previous studies (Agarwal and Medury, 2014; Hillison et al., 1999) is normal, valid and reliable. The discussion above satisfactorily shows that the first objective of this study has been achieved.

Table 3: One Way ANOVA between Bankers’ Demographics and the Risk of Asset

Misappropriation in the Banking Sector

Demographics ANOVA Welch Brown-Forsythe

Age 0.01

*

Working experience 0.01

*

Gender

Marital status

Position

0.89

0.01

0.58

*

Academic qualification 0.10

*

Working department 0.49

0.01

0.01

0.89

0.01

0.41

0.01

0.44

*

*

*

*

0.01

0.01

0.89

0.01

0.56

0.01

0.48

*

*

*

*

* Significant p-value

This study has adopted the one way analysis of variance (ANOVA) to satisfy the second research objective, which is to assess the association between the studi ed bankers’ demographics and the risk of asset misappropriation in the Malaysian banking sector. Table 3 depicts the one way ANOVA statistical results. The significance level is set at 10% based on the recommendation by Zikmund et al. (2010). Previous researchers have adopted p < 0.01, p < 0.05 and p < 0.10 as their cutoff points in justifying significant relationships. However, this study will uphold the argument of Zikmund et al.

(2010) in picking a cutoff threshold of ten percent significance level (p < 0.10). Previous fraud studies have also adopted a ten percent significance level (Kaminski et al., 2004).

6

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

From the one way ANOVA test results as depicted in Table 3, it is apparent that only the bankers’ age, working experience, marital status and academic qualification have influenced their perception of the risk of asset misappropriation in the Malaysian banking sector. Complementary to the one way

ANOVA results, the Welch and Brown-Forsythe test results are also significant for age, working experience, marital status and academic qualification, further strengthening the argument in favour of the associations. The other demographic characteristics tested such as gender, position and working department do not influence the bankers’ perception on the risk of asset misappropriation in their organisations. The findings of this study are very similar to that of Liew et al. (2011) except that their study had adopted a different instrument measuring white collar crimes. From an additional post hoc assessment, several conclusions can be made to further explain the results of this ANOVA test

(Table 3). People who are in their early 20s believe that the risk of asset misappropriation is slightly prevalent in their organisation whereas people in their late 30s view it the other way around.

Secondly, people with diploma and degree qualifications as compared to professional qualifications provide contrasting opinions. The findings provide evidence that bankers with diploma and degree qualifications are fairly neutral in agreeing to the presence of the risk of asset misappropriation in their organisations. In other words, they are neither in agreement nor in disagreement. Thirdly, there is a significant difference between the views of married bankers and single bankers. The seven point

Likert scale in the measurement of the items within the construct indicates that the higher the mean, the more the respondents agree that there is a perceived risk of asset misappropriation within their organisations. Married bankers’ perception (mean = 2.56) and single bankers’ perception (mean =

3.04) illustrate that married bankers tend to disagree more than their single counterparts on the presence of the risk of asset misappropriation in the organisations they are working in. It is also noted that the mean score for the perception of single bankers is closed to neutral. Inference can be made here that single bankers are more skeptical than married bankers. It is not known why marital status influences such a perception. Finally, the lesser the bankers’ working experience, the more they believe that the risk of asset misappropriation exists in their organisations. This means that young bankers see fraud as a prevalent risk as compared to bankers with more than twenty years’ of working experience. With these findings, the second research objective has been duly met.

6. Conclusions and Recommendations

Three possible recommendations can be derived from this study. Firstly, there is a need to conduct a qualitative study to ascertain the underlying causes of the findings in this study. This will further strengthen the knowledge in this area. Secondly, this study can be replicated in full or partially in different industry settings and environments. More studies in this area will provide useful comparisons for a more advanced assessment on the issue at stake. Thirdly, future researchers may adopt the validated instrument developed in this study to propagate further investigations. Perhaps the relationship between the risk of asset misappropriation and a host of other factors, such as whistleblowing, corporate governance, internal control system and culture could be examined using the instrument developed in this study. Table 4 below enumerates the measurement of the risk of asset misappropriation as one of the outcomes of this study. This new instrument improves the one proposed by previous researchers as shown in Table 1.

7

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

Table 4: Measurement of the Risk of Asset Misappropriation

NO STATEMENT

AM1 Stealing cash funds processed or on hand is common in the banking sector.

AM2 Stealing the cash received without any recording is common in the banking sector.

AM3 Stealing a portion of the cash received by understating sales is common in the banking sector.

AM4 Altering bank deposits is common in the banking sector.

AM5 Writing off receivables and stealing the cash received from the written off account is common in the banking sector.

AM6 Conspiracy between buyers and sellers to process refunds for goods not returned is common in the banking sector.

AM7 Stealing merchandise, tools, supplies, and other assets are common in the banking sector.

AM8 Selling waste and scrap materials and pocketing the proceeds is common in the banking sector.

AM9 Setting up non-existing employees (phantom employees) on the payroll records and taking their pay cheques is common in the banking sector.

AM10 Manipulating payroll records to divert wages, payroll taxes, or pay cheques is common in the banking sector.

AM11 Charging personal purchases to the bank through misuse of the bank’s credit cards is common in the banking sector.

References

Agarwal, G.K and Medury, Y. (2014). Internal Auditor as Accounting Fraud Buster. IUP Journal of

Accounting Research and Audit Practices, Jan 01, 13(1), pp 7-29

Ahmad, Z., and Norhashim, M. (2008.) The control environment, employee fraud and counterproductive workplace behaviour: An empirical analysis. Communications of the IBIMA,

(3), pp 145-155.

Bartlett, J. E., Kotrlik, J. W., and Higgins, C. C. (2001). Organisational Research: Determining

Appropriate Sample Size in Survey Research. Spring, 19(1), Retrieved December 03, 2013,

From http://www.osra.org/itlpj/bartlettkotrlikhiggins.pdf

Chinda, T., and Mohamed, S. (2008). Structural equation model of construction safety culture.

Engineering, Construction and Architectural Management, 15(2), pp 114

–131.

Coram, P., Ferguson, C., and Moroney, R. (2008). Internal audit, alternative internal audit structures and the level of misappropriation of assets fraud. Accounting and Finance, 48(2008), pp 543-

559.

8

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

Cressey, D. (1953). Other people’s money; a study in the social psychology of embezzlement.

Glencoe, IL, Free Press.

Hillison, W., Pacini, C., and Sinason, D. (1999). The internal auditor as fraud-buster. Managerial

Auditing Journal, 14(7), pp 351

–363.

Hooper, D., Coughlan, J., and Mullen, M. R. (2008). Structural Equation Modelling: Guidelines for determining model fit. Electronic Journal of Business Research Methods, 6(1), pp 53

–60.

Kaminski, K. A., Wetzel, T. S., and Guan, L. (2004). Can financial ratios detect fraudulent financial reporting? Managerial Auditing Journal, 19(1), pp 15

–28.

KPMG (2009). KPMG Fraud Survey 2009 Report. Malaysia

Krejcie, R. and Morgan, D. (1970), “Determining sample size for research activities”, Educational and

Psychological Measurement, 30, pp 607-10

Kung, F.H., and Huang, C.L. (2013). Auditors' moral philosophies and ethical beliefs. Management

Decision, 51(3), pp 479

– 500

Lei, M., and Lomax, R.G. (2005). The effect of varying degrees of non-normality in structural equation modeling. Structural Equation Modeling: A Multidisciplinary Journal, 12(1), pp 1-27

Liew, S. W., Puah, C., and Entebang, H. (2011). White-collar crime: a statistical study on its common causes. Social Sciences 2(4), pp 44

–49.

PwC Global Economic Crime Survey (2009)

Ramamoorti, B. S., and Dupree, J. (2010). Continuous controls monitoring can help deter and prevent fraud. Financial Executive, 26(3), pp 66-68.

Singh, R. (2009). 'Does my structural model represent the real phenomenon?: A review of the appropriate use of structural equation modelling (SEM) model fit indices'. The Marketing

Review, 9 (3), pp 199-212.

Weinberg, S.L., and Abramowitz, S.K. (2002). Data analysis for the behavioural sciences using

SPSS. Cambridge, U.K: Cambridge University Press.

Wells, J.T. (2007), Corporate fraud handbook, John Wiley and Sons, Inc., New Jersey, (2), pp 2-400.

Wheaton, B., Muthen, B., Alwin, D., F., and Summers, G. (1977). Assessing reliability and stability in panel models. Sociological Methodology, 8 (1), pp 84-136.

Zikmund, W.G., Babin, B., Carr, J., and Griffin, M. (2010), Business Research Methods. International

ISE Edition, South-Western, Cengage Learning 8 th

Edition.

9

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

Appendix

Model Fit Summary

CMIN

Model

Default model

NPAR

30

CMIN

160.827

DF

36

P

.000

CMIN/DF

4.467

Saturated model 66 .000 0

Independence model 11 4065.495 55 .000 73.918

RMR, GFI

Model RMR GFI AGFI PGFI

Default model .084 .925 .862 .504

Saturated model .000 1.000

Independence model 1.898 .164 -.003 .137

Baseline Comparisons

Model

NFI

Delta1

RFI rho1

IFI

Delta2

TLI rho2

CFI

.960 .940 .969 .952 .969 Default model

Saturated model 1.000 1.000 1.000

Independence model .000 .000 .000 .000 .000

Parsimony-Adjusted Measures

Model

Default model

PRATIO PNFI PCFI

.655 .629 .634

Saturated model .000 .000 .000

Independence model 1.000 .000 .000

NCP

Model

Default model

Saturated model

NCP

124.827

.000

LO 90

89.221

.000

HI 90

167.981

.000

Independence model 4010.495 3804.995 4223.252

FMIN

Model

Default model

FMIN

.483

F0

.375

LO 90

.268

HI 90

.504

Saturated model .000 .000 .000 .000

Independence model 12.209 12.044 11.426 12.682

RMSEA

Model

Default model

RMSEA

.102

Independence model .468

LO 90

.086

.456

HI 90

.118

.480

PCLOSE

.000

.000

10

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

AIC

Model

Default model

Saturated model

AIC

220.827

132.000

BCC

223.070

136.935

BIC

335.161

383.535

CAIC

365.161

449.535

Independence model 4087.495 4088.317 4129.417 4140.417

ECVI

Model

Default model

ECVI

.663

LO 90

.556

HI 90

.793

MECVI

.670

Saturated model .396 .396 .396 .411

Independence model 12.275 11.658 12.914 12.277

HOELTER

Model

Default model

Independence model

HOELTER

.05

106

7

HOELTER

.01

122

7

Regression Weights: (Group number 1 - Default model)

Estimate S.E. C.R. P Label

AM11 <--- ASSET_MISAPPROPRIATION 1.000

AM10 <--- ASSET_MISAPPROPRIATION .944 .046 20.715 *** par_1

AM9 <--- ASSET_MISAPPROPRIATION .940 .043 21.783 *** par_2

AM8 <--- ASSET_MISAPPROPRIATION .881 .049 17.866 *** par_3

AM7 <--- ASSET_MISAPPROPRIATION .935 .047 19.858 *** par_4

AM6 <--- ASSET_MISAPPROPRIATION .961 .047 20.520 *** par_5

AM5 <--- ASSET_MISAPPROPRIATION .947 .045 21.277 *** par_6

AM4 <--- ASSET_MISAPPROPRIATION 1.016 .048 21.106 *** par_7

AM3 <--- ASSET_MISAPPROPRIATION .961 .046 20.729 *** par_8

AM2 <--- ASSET_MISAPPROPRIATION .925 .048 19.182 *** par_9

AM1 <--- ASSET_MISAPPROPRIATION .899 .053 16.939 *** par_10

11

Proceedings of 10th Global Business and Social Science Research Conference

23 -24 June 2014, Radisson Blu Hotel, Beijing, China, ISBN: 978-1-922069-55-9

Standardized Regression Weights: (Group number 1 - Default model)

Estimate

AM11 <--- ASSET_MISAPPROPRIATION .867

AM10 <--- ASSET_MISAPPROPRIATION .850

AM9 <--- ASSET_MISAPPROPRIATION .872

AM8 <--- ASSET_MISAPPROPRIATION .780

AM7 <--- ASSET_MISAPPROPRIATION .829

AM6 <--- ASSET_MISAPPROPRIATION .845

AM5 <--- ASSET_MISAPPROPRIATION .861

AM4 <--- ASSET_MISAPPROPRIATION .857

AM3 <--- ASSET_MISAPPROPRIATION .849

AM2 <--- ASSET_MISAPPROPRIATION .813

AM1 <--- ASSET_MISAPPROPRIATION .755

Assessment of normality (Group number 1)

Variable

AM1

AM2

AM3

AM4

AM5

AM6

AM7

AM8

AM9

AM10

AM11

Multivariate min max skew c.r. kurtosis c.r.

1.000 7.000 .802 5.981 -.437 -1.630

1.000 7.000 .818 6.105 -.400 -1.492

1.000 7.000 .742 5.534 -.456 -1.702

1.000 7.000 .822 6.131 -.388 -1.448

1.000 7.000 .825 6.155 -.261 -.973

1.000 7.000 .755 5.632 -.329 -1.228

1.000 7.000 .791 5.899 -.299 -1.115

1.000 7.000 .822 6.131 -.232 -.865

1.000 7.000 .923 6.889 -.031 -.116

1.000 7.000 .901 6.722 -.086 -.321

1.000 7.000 .832 6.206 -.256 -.954

91.437 49.406

12

Download